Author Login Editor-in-Chief Peer Review Editor Work Office Work

05 June 2010, Volume 36 Issue 11
    

  • Select all
    |
    Networks and Communications
  • CENG Meng, YANG Yang, WANG Yuan-Zhuo, ZHANG Jing-Le
    Computer Engineering. 2010, 36(11): 1-4. https://doi.org/10.3969/j.issn.1000-3428.2010.11.001
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    Aiming at purchasing decision-making existing problems of supplier and order selection in E-business Logistics Management System(ELMS), this paper gets supplier selection scheduling algorithm according to ELMS purchase process and multi-attribute decision-making method. It realizes order selection strategy using multiple servers multi-queue model based on Stochastic Petri Net(SPN). Performance analysis results show that this method can effectively enhance throughput and reduce rate response time of ELMS.

  • WANG Hui-bin1,2, ZHU Yue-fei1
    Computer Engineering. 2010, 36(11): 5-7,10. https://doi.org/10.3969/j.issn.1000-3428.2010.11.002
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    Aiming at the problem of lacking mathematics model, level structure no clarity and application rang narrow in security authentication protocol, this paper presents protocol composition deduction system. It divides the design of security protocols into three levels. The first level is realizing basic key exchange and identity verification, the second level is the efficiency promotion and realization mechanism of defending denial of service attack, the third level is the security analysis of security protocols and verifying the security properties by automatic test tool. Simulation results show that this system can realize formal design for security authentication protocol, and it can be conveniently extended and transplanted according to need.

  • Chen-Min, GAO Hua-Dong, LUAN Chao-Jun, XI Yu-Beng
    Computer Engineering. 2010, 36(11): 8-10. https://doi.org/10.3969/j.issn.1000-3428.2010.11.003
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    In order to meet the demands for large scale databases clustering, this paper proposes a parallel clustering algorithm based on density for computer colony. This algorithm goes on data partition according to database distribution feature, processes data block parallel clustering on every node, merges clustering result on main node. Experimental result shows that computing speed of this algorithm is linear increment with number of node increasing, and it has better extensibility.

  • LEI Xin, CA Tie, XU Jun
    Computer Engineering. 2010, 36(11): 11-13. https://doi.org/10.3969/j.issn.1000-3428.2010.11.004
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    Aiming at the problem of guard sub carrier and non-2n interval pilot insertion for OFDMA system based on IEEE 802.16d/e standard, this paper presents a DFT-based time domain LS channel estimation algorithm. A low-rank approximation estimator based on DFT is derived through the Singular Value Decomposition(SVD) process of matrix T, and matrix T is easier to get than autocorrelation matrix R. Simulation results show that the channel estimation performance and computational complexity of this algorithm are between LMMSE-SVD algorithm and IFFT/FFT algorithm, but the requirement for pilot is less critical of this algorithm, and the scope of application is more widely.

  • LIN Ying, WANG Chang-Lin
    Computer Engineering. 2010, 36(11): 14-16. https://doi.org/10.3969/j.issn.1000-3428.2010.11.005
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    The safety technology platform of onboard ATP is a three computer channels of the fault-tolerant computer, and how to ensure the system synchronization of three computers is one of its key technologies. Aiming at the synchronization technology, this paper brings forward the mode, which combines the model of public time synchronization with the model of bounded variance ratio of drift of time to compensate the offset and drift to achieve the synchronization of local time of three systems. Based on this, software adopts scheduling-control to achieve the synchronization of tasks of three systems. According to several tests, the synchronization mechanism proves that it can satisfy the requirement of three computer channels of the fault-tolerant computer.

  • HONG Zhi-Yong, HUANG Hui, QIN Ke-Yun
    Computer Engineering. 2010, 36(11): 17-17-19. https://doi.org/10.3969/j.issn.1000-3428.2010.11.006
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    A power system transient stability assessment method is proposed based on an information fusion model. When accidents occur, much information obtained from power networks and generators is synthesized to diagnose power system transient stability by the method. D-S evidence theory is fused for further reducing the uncertainty of transient stability assessment. A 10-generator and 39-bus power system is simulated. The simulation result indicates that the proposed method is more precise than the old methods.

  • LIU Jun, ZHOU Qiang, HU Ru
    Computer Engineering. 2010, 36(11): 20-21,24. https://doi.org/10.3969/j.issn.1000-3428.2010.11.007
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    Aiming at the shortcomings of traditional image encryption algorithm in efficiency and security, a new image encryption algorithm named square is proposed, which is composed of square permutation and revised mixing operations. The new algorithm satisfies all requirements for parallel image encryption. It is faster and securer than MASK algorithm and can run on practical parallel computing platform.

  • LUO Yi, TUN Chan-Le
    Computer Engineering. 2010, 36(11): 22-24. https://doi.org/10.3969/j.issn.1000-3428.2010.11.008
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    In order to select suitable compensation service, this paper presents a Web transaction Quality of Service(QoS) framework based on compensation factor. It makes compensation cost and reliability of transaction coordination as a QoS extension. Transaction coordinator is based on built QoS rule base to progress transaction selection and restore. It can enhance transaction whole QoS attribute and satisfy QoS requirement of transaction request. Experimental result shows that this framework can reduce compensation cost of Web transaction, and enhance success rate of Web transaction.

  • GUAN Xin, LI Qiang, TIAN Hong-Wei
    Computer Engineering. 2010, 36(11): 25-26,29. https://doi.org/10.3969/j.issn.1000-3428.2010.11.009
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    To reduce the limited range when used to multiple kinds of music signals and high computing complexity of existing note onset automatic detection methods, a note onset detection algorithm based on differential all phase Mel Frequency Cesptrum Coefficients(MFCC) is presented. All phase preprocessing alleviates spectrum ambiguity because of spectrum leakage. And differential Mel frequency cesptrum considered nonlinearity of human ear when responding to different frequencies and dynamic property of music signal. Experimental result demonstrates this algorithm is fit for multiple kinds of music and has perfect general detection performance with lower computing complexity compared with those of High Frequency Content(HFC) and Independent Component Analysis(ICA).

  • HU Jian-Feng, JIANG De-Rong, YIN Jing-Hai, MU Zhen-Dong
    Computer Engineering. 2010, 36(11): 27-27-29. https://doi.org/10.3969/j.issn.1000-3428.2010.11.010
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    A method which used wavelet package is put forward to extract the feature of Eectroencephalogram(EEG) signals more efficiently. With the help of wavelet, the original EEG signals are decomposed and recomposed at the related frequency range, which is in order to feature extraction, and computed with BP neural network technology. Experimental result shows that the wavelet can extract the feature waves efficiently, which are obtained with more than 80 percent identification rate for three participators, person identification can be used by persons with disabilities and the general public, it has better adaptation.

  • ZHANG Yan-Mei, CAO Fu-Hu
    Computer Engineering. 2010, 36(11): 30-32,35. https://doi.org/10.3969/j.issn.1000-3428.2010.11.011
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    A two-tier service placement strategy based on the P2P overlay network framework is proposed. The optimization model is built for intra-domain Service Placement Problem(SPP) and an efficient algorithm is designed to solve the problem. Several cost calculation methods are adopted to fit different structures of the composed service. Simulation result shows the intra-domain service placement strategy decreases the cost for intra-domain composed services, and the two-tier service placement strategy decreases the total cost of composed services.

  • ZHANG Jian-Yang, LIN Min-Hong, WANG Xiu-Kun
    Computer Engineering. 2010, 36(11): 33-35. https://doi.org/10.3969/j.issn.1000-3428.2010.11.012
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    A transaction consists of a serial of operations, and has ACID properties. However, in large-scale distributed applications, the traditional transaction model is not applicable. A transaction model based on local closed world assumption, as well as data replication, is proposed. Its features, concurrency control and correctness are also investigated and demonstrated. This transaction model is illustrated with a teaching management system.

  • LIU Xiao-Su, GUO Fu-Liang
    Computer Engineering. 2010, 36(11): 36-36-38. https://doi.org/10.3969/j.issn.1000-3428.2010.11.013
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    As the performance of the association mining algorithm can be changed by the property of the input data, the same algorithm can do different to the different data set. Therefore, this paper categorizes the input data into there groups, and takes different methods to deal with the first two data sets. The examples show that the above processing can improve the quantity of the output patterns. In order to develop the quantity of data mining, it simply introduces the interestingness of patterns, and the interestingness preprocessing of the association patterns. According to the above analysis, it proposes a new method of mining interesting association patterns.

  • CHEN Cheng-cai, ZHANG Yao-xue, ZHOU Yue-zhi, GAO Yuan
    Computer Engineering. 2010, 36(11): 39-41,44. https://doi.org/10.3969/j.issn.1000-3428.2010.11.014
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    A virtual machine-based transparent computing system called MMNC-VX is implemented so that heterogeneous operating systems can run unmodified on-demand in a transparent computing environment, but its performance has the very big disparity compared with PC. In order to solve this problem, this paper presents a lightweight virtual machine based transparent computing system LBTC which only virtualizes network devices and allows user operating system to access other devices except network device directly to decrease extra overhead because of virtualization. Meanwhile LBTC adds a virtual storage device model in service operating system to redirect storage I/O requests to be dealt with by the server to implement transparent computing. Test results show the prototype’s performance has the same level as PC with the same hardware and is improved compared with MMNC-VX.

  • JIANG Tong, JIN Zong-An, XIE Dong
    Computer Engineering. 2010, 36(11): 42-44. https://doi.org/10.3969/j.issn.1000-3428.2010.11.015
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    In probabilistic database, aggregation query processes each possible world, but the number of possible may be exponentially growing with the increase of tuple number. So, aggregation query can not be calculated in linear time when there is a relatively large number of tuples. Three aggregation components are defined for each aggregation function. By encoding original probabilistic relation and using conversion, storage procedure and approximate calculation methods respectively, aggregation query can be implemented in linear time. Theoretical proof and experimental results show that the methodology used is correct and efficient.

  • ZUO Li-Yun
    Computer Engineering. 2010, 36(11): 45-46,49. https://doi.org/10.3969/j.issn.1000-3428.2010.11.016
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper gives the content of an effective network security model against the threat of the Internet which can effectively solve the problem of content security analysis of Internet content security model, including its core algorithm——SIOP algorithm, which used to transfer compare the characters comparison in the query into an idea of numerical computing, and there is no limit on words in length, more suitable for large-scale Internet content security analysis system. Results show that the algorithm is effectively feasible, and the query speed increases 160% compared with other relative algorithms.
  • YANG Xiao-Wen, HAN Xie
    Computer Engineering. 2010, 36(11): 47-49. https://doi.org/10.3969/j.issn.1000-3428.2010.11.017
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    According to the require of data model based on the memory and query function of Networked Automatic Test System(NATS), this paper compares the merits and defects from different data models such as the extended relational model, semantic data model and object oriented data model, proposes the basic frame of the database which is that static data information adopts relational data model and unstructured multimedia data adopts a method combing object-relational model with file system, and implements the total design of NATS. Experimental result shows the validity of the frame.

  • LIN Feng, BAO Xiao-Lou, WANG Xiao-Juan, LI Bing
    Computer Engineering. 2010, 36(11): 50-51,54. https://doi.org/10.3969/j.issn.1000-3428.2010.11.018
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    An algorithm of test case generation for combinatorial design is proposed in this paper. The conception of pair-index table is defined, based on which the adaptive genetic algorithm is introduced to generate test cases. The tool developed based on the proposed algorithm, GATG, is presented. Compared with the same kind of tools, GATG almost has the same performance in the experiment, and the algorithm is useful and improvable.

  • JUE Zhen-Xin, TANG Qing-Qun
    Computer Engineering. 2010, 36(11): 52-54. https://doi.org/10.3969/j.issn.1000-3428.2010.11.019
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    To solve weak semantics problem of integrating heterogeneous databases by semantic technology, which is caused by the scale of records, an algorithm is proposed. It gives consideration to efficiency and reasoning ability. Ontology and queries are expressed as graphics. Sub-graph is matched with semantics. The result is translated into database query language. This algorithm supports more rich semantics than the algorithm that rewrites semantic query into SQL does.

  • LI Zhi-Fa, SHAO Wei-Min, LEI Zhi-Jiang
    Computer Engineering. 2010, 36(11): 55-57. https://doi.org/10.3969/j.issn.1000-3428.2010.11.020
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    In view of current situation that the passenger’s transfer rate in public transportation system is quite high in city, a highly effective, reasonable transfer system for public transportation is studied and designed. This system uses ArcGIS Engine combined with C#.NET to carry on integrated secondary development, through a kind of improved Dijkstra algorithm, constructs a line-station transfer matrix contain information of the route and transfer station, and extracts the most feasible route plan from matrix that has the least number of transfer.

  • LIU Zhuang-Li, GUO Wei, WEI Ji-Ceng
    Computer Engineering. 2010, 36(11): 58-60. https://doi.org/10.3969/j.issn.1000-3428.2010.11.021
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    This paper presents a compiler’s back-end optimizing design for Transport Triggered Architecture(TTA) processor using linear scan algorithm, the algorithm is used to accomplish global register allocation. The application of this algorithm makes TTA compiler so many advantages, such as the quality of code obtained is high, time and space complexity is low, and implementation is easy. Experimental results show that the advantages of the algorithm are especially obvious when source programs contain large number of variables competing for same number of registers.

  • WU Ling, MA Ji
    Computer Engineering. 2010, 36(11): 61-63. https://doi.org/10.3969/j.issn.1000-3428.2010.11.022
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at the problems of workflow system applying in knowledge management faces the uneasy data integration, implicit definition of vocabulary, and inflexible control of authentication access, this paper puts forward a workflow knowledge management system architecture based on ontology. The system uses XML as the format of file exchange and storage, integrates different domain knowledge’s concept and relation character into the workflow with the method of ontology, and designs an authentication management mechanism based on role inheritance to achieve accurate file access control. The paper introduces the architecture and analyses the design of workflow engine and implementation mechanism. The architecture provides a new control model for knowledge management in workflow. The engineering design inspection system using the architecture is well.
  • JIANG Jian-Zhong, DING Bao-Qiong, TUN Qiong, QIU Wen-Wu
    Computer Engineering. 2010, 36(11): 64-66,72. https://doi.org/10.3969/j.issn.1000-3428.2010.11.023
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    This paper reviews dominating Webpage ranking algorithms, improves HITSS algorithm among of them, and proposes a new algorithm——BHITS based on Webpage sub-block. BHITS algorithm uses the right values of different theme plates, the platea are calibrated by its topic and the right values of different subject sections are set according to the subjects of information to be collected, which improves the capacity of the hyperlinks distinguishing, while high efficiency is kept. From the contrastive experiment with the related algorithms, the result shows that the precision of BHITS algorithm is significantly higher than that of other algorithms.

  • GUO Wei, GUI Xiao-Lin
    Computer Engineering. 2010, 36(11): 67-69,72. https://doi.org/10.3969/j.issn.1000-3428.2010.11.024
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    Aiming at data structures complexity and hard construction of space-flight real-time data-driven software, the automated test data generation algorithm is proposed for space-flight real-time data-driven software function test which is based on Simulated Annealing(SA) multi-parent Genetic Algorithm(GA). The method of adapting function and the strategy of variation function are discussed. The analysis based on the application proves that the algorithm can find near 30% more software failures than common methods.

  • XIAO Rong
    Computer Engineering. 2010, 36(11): 70-72. https://doi.org/10.3969/j.issn.1000-3428.2010.11.025
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    This paper presents Web as the object to be assigned to registers, constructs the interference graph of Webs by data flow analysis of Web liveness. Compared with interference graph of variables, the nodes based on variables are splitted into new nodes based on Web, over which the variables’ interference is distributed. The interference graph based on Webs has more nodes, but these nodes’ degree are less. Thus the graph can be colored with less colors. It can reduce the number of required registers to produce more efficient executive code and make register allocation more flexible.

  • WANG Hai-Yan
    Computer Engineering. 2010, 36(11): 73-74,77. https://doi.org/10.3969/j.issn.1000-3428.2010.11.026
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    Aiming at the limitation of Open Grid Services Architecture-Data Access and Interface(OGSA-DAI) middleware only face to JDBC, an unified heterogeneous data access interface middleware based on .net framework is proposed. XML Web Service cross-platform technology and enhanced ADO.net database access capability are used, which not only get a common interface and easy scalability, but also shield the bottom of the details on interface for data access, database connectivity, data format conversion, data transmission, database integration etc. Test result shows that the middleware is current, flexible and reliable.

  • DING Chun-Rong, LI Long-Shu, YANG Bao-Hua
    Computer Engineering. 2010, 36(11): 75-77. https://doi.org/10.3969/j.issn.1000-3428.2010.11.027
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    Aiming at the problems of complex and low efficiency decision tree constructed by ID3, this paper proposes a decision tree classification algorithm based on rough set, which takes the weighted classification rough degree as the heuristic function of choosing attribute at a node. This heuristic function can synthetically measure contribution of an attribute for classification, and is simple in calculation. To eliminate the effect of noise data on choosing attributes and generating leaf nodes, a method using variable precision rough set model is used to optimize the algorithm. Experimental results show that the size of trees generated by the new algorithm is smaller and higher accuracy than ID3 algorithm.

  • BO De-Li, WEI Shi-Min, BANG Song-Song
    Computer Engineering. 2010, 36(11): 78-79,82. https://doi.org/10.3969/j.issn.1000-3428.2010.11.028
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    For the question of persistent storage in J2ME programs, according to Mobile Information Device Profile(MIDP), this paper proposes an object-oriented scheme with caching mechanism for storage and management. It encapsulates data into object, separates the data access and data storage by using data manage level between program and persistent storage, and uses the caching mechanism to raise the data access efficiency. The feasibility of the scheme is verified by the experiments. Experimental result indicates the access efficiency of frequently access data is improved by use of caching mechanism.

  • SU Lei, LI Qian, SHANG Wei
    Computer Engineering. 2010, 36(11): 80-82. https://doi.org/10.3969/j.issn.1000-3428.2010.11.029
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    This paper introduces and analyzes the OPC DA 2.05A specification, implements Component Object Model(COM) object based on the Active Template Library(ATL), and realizes OPC client applications in VC++6.0 IDE. It gives the general steps and key technologies of OPC client implementation. It is tested and verified that this OPC client can realize stable and fast data exchange with standard OPC server by using Kepware’s OPC Server KEPServerEx V4.0.

  • QIN Zhao-Xuan, CENG Yi, CHAI Yan-Xin, XU Pan-De
    Computer Engineering. 2010, 36(11): 83-84,87. https://doi.org/10.3969/j.issn.1000-3428.2010.11.030
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Since the current researches of activity diagram do not take into account of the polymorphism, which is one of the most important characteristics of the object-oriented software, it is impossible to test the polymorphism information of the activity diagram. Combining with the object-oriented polymorphic feature, this paper uses UML class diagram to do weighted expansion to the nodes containing polymorphism information in the activity diagram, and traversals it with an optimization algorithm to get the test case series which are smaller in amount but higher in coverage rate. It uses an example to prove the availability and effectiveness of the approach.
  • ZHOU Yong, LUO Jing-Jia, CHENG Chun-Tian
    Computer Engineering. 2010, 36(11): 85-87. https://doi.org/10.3969/j.issn.1000-3428.2010.11.031
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    This paper introduces a model based on Principal Component Analysis(PCA), Independent Component Analysis(ICA) and multiple data stream model which supplies a new method of multiple data stream relation analysis and pattern discovery. As PCA/ICA can separate independent components from complicated information, a solution can be implemented with the help of PCA/ICA on multiple data stream relation analysis, pattern discovery and hidden variables. The robustness and real-time performance are also discussed in the experiment.

  • CUI Xue-Bing, ZHANG Dun-Feng, CUI Beng-Fei
    Computer Engineering. 2010, 36(11): 88-89,92. https://doi.org/10.3969/j.issn.1000-3428.2010.11.032
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In reverse engineering, software pipelining loop causes some difficulties in reverse translation. This paper proposes a solution of processing software pipelining loop in IA-64 binary translation, which adopts the direct semantic map algorithm. The validity of the proposed algorithm to process software pipelining is verified in the binary translation in the experiment. It establishes the basis of processing software pipelining in IA-64 binary translation.
  • LIU Dun-Chi, OU Yang-Song
    Computer Engineering. 2010, 36(11): 90-92. https://doi.org/10.3969/j.issn.1000-3428.2010.11.033
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    The workflow adaptability is restricted by active routing, the quantity and performance of resource, the role’s authority, and time. To resolve these constraints problems, this paper presents a workflow soft constraints network model. Based on policy-based workflow management system, it uses soft constraints network to quantize policy and optimize policy, which are used to guide policy decision-making. Analysis shows that this method of model and policy decision-making has obvious advantages on improving model description ability, decreasing model complexity and improving system adaptability.

  • HU Xiao-Qin, HU Ying-Qiong, CA Zhi-Yong, YANG Wei-Feng
    Computer Engineering. 2010, 36(11): 93-94,97. https://doi.org/10.3969/j.issn.1000-3428.2010.11.034
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    According to the features of bus-style avionics, by analyzing 1553B bus protocol standard, this paper abstracts the unified behavior and attribute model, describes the information of simulation equipments in form of simulation database, designs and develops a universal 1553B bus interface simulation software with VC++ 6.0. The simulation software can carry out relevant data processing after receiving excitation data according to the requires filled in the simulation database, so that the simulation platform has higher flexibility.
  • HOU Guan-Bo, YANG Shou-Bao, HU Yun
    Computer Engineering. 2010, 36(11): 95-97. https://doi.org/10.3969/j.issn.1000-3428.2010.11.035
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    A link quality-based distributed channel assignment algorithm in IEEE 802.11 Wireless Mesh Network(WMN) is presented. It scans to collect all the channels information and assigns channels according to link quality. The algorithm can adjust channel dynamically when the network topology or link quality changes. Simulation results demonstrate that, compared with centralized channel assignment algorithm, this algorithm can improve network throughput significantly.
  • ZHOU Zhen-Chao, BI Yao-Beng, LI Min
    Computer Engineering. 2010, 36(11): 98-100. https://doi.org/10.3969/j.issn.1000-3428.2010.11.036
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Combined with genetic clustering and K-means algorithm, a mixed node clustering algorithm is presented, which clusters the distance between nodes for unstructured P2P network. It optimizes the overlay network, and improves the routing efficiency. Experimental results show this algorithm has good reliability and expansibility. It can have an effective nodes clustering for unstructured P2P network. After clustering, the average latencies of nodes obviously decrease.
  • GUO Xiao-Xue, QIN Yong, YUAN Yi
    Computer Engineering. 2010, 36(11): 101-104. https://doi.org/10.3969/j.issn.1000-3428.2010.11.037
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at the problems of not supporting IPv6, few number of links and poor schedule ability of traditional broadband network access system, an architecture of links access supporting IPv6 is presented. To support large-scale links access, the high efficiency computing method based on kernel mode and the model of distributed parallel processing are drawn. The method of load balancing in multi processing nodes and traffic control are researched. Experimental results show this system can achieve better performances.
  • WANG Qing-Beng, XU Bu-Gong
    Computer Engineering. 2010, 36(11): 105-107. https://doi.org/10.3969/j.issn.1000-3428.2010.11.038
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In ZigBee network, node with routing capability starts the route discovery by broadcasting Route Request(RREQ) command frame with a preset broadcast radius. Uncontrolled broadcasting data will impact performance of the network. This paper proposes an advanced broadcast strategy for route discovery by reducing the broadcast depth with the addresses information and the neighbor table. Simulation result shows that the algorithm can discover the optimum route, reduce the rebroadcast of RREQ command frame and improve the performance of the networks.
  • LIU Qiu-Meng, CA Zhi-Yong, WANG Jian
    Computer Engineering. 2010, 36(11): 108-110. https://doi.org/10.3969/j.issn.1000-3428.2010.11.039
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Resilient Packet Ring(RPR) is one of the important development orientation of LANs. In order to guarantee the QoS of traffic based on priority division, RPR adopts the multiple-channel and multiple-queue to differentiate the traffic with priorities. This paper uses M/G/1/K model to analyze the length of RPR queue systems. Comparing with M/G/1 model, the model can get exacter result and is more valuable in application.
  • HU Hai-Lin, WANG Lei
    Computer Engineering. 2010, 36(11): 111-113. https://doi.org/10.3969/j.issn.1000-3428.2010.11.040
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper research the anti-monitor problem of mobile object in the mobile sensory field and designs a new exposure model, which can be used to estimate the exposure degree when a mobile object is moving along a path to traverse the sensory field deployed with lots of mobile anisotropic sensor nodes. Based on the model, a decision algorithm is proposed by using Voronoi grid, which guarantees the mobile object to select a suitable path with approximately minimal risk to travel across the mobile anisotropic sensory field. Theoretical analysis and simulation results show that this algorithm is practicable and reliable.
  • XU Kun, CU Wen-Feng
    Computer Engineering. 2010, 36(11): 114-116,119. https://doi.org/10.3969/j.issn.1000-3428.2010.11.041
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper researches the number of annihilators of a Boolean function, gives a new way to take count of the independent annihilators based on the coefficient matrix of a Boolean function. It presents the concept of low annihilators of a Boolean function, and gives a way to find them based on the new way of counting the independent annihilators of a Boolean function. It depicts the attack notion by using the low annihilators of a Boolean function to establish an equation group.
  • JIAN Yi, DIAO Yi-Ming, CHEN Wei-Jun
    Computer Engineering. 2010, 36(11): 117-119. https://doi.org/10.3969/j.issn.1000-3428.2010.11.042
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at the problem of current ID-based blind signature scheme that its security is based on the trusted Private Key Generator(PKG), this paper realizes an ID-based partially blind signature scheme by using bilinear pairing. The scheme combines restrictive partial blind signature and threshold properties. Analysis results show that compared with the related research, this scheme maintains efficiency while ensuring higher security and bringing in more security properties.
  • CHEN Dun-Jie, SHI Yong, XUE Zhi, CHEN Xin
    Computer Engineering. 2010, 36(11): 120-122. https://doi.org/10.3969/j.issn.1000-3428.2010.11.043
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The technology of anti-key loggers update quickly, and the existent key-logger method has various defects. Aiming at this situation, this paper presents a new type of key-logger. Based on Shadow System Service Description Table(SSDT) and callback function of kernel layer, this method combines the user mode and the kernel mode. It makes the whole design to break the current record of the mainstream anti-keyboard instruments. It has high stability, versatility, and strong stealthiness.
  • WANG Jin-Dong, CHEN Liu-Jing, WANG Kun, WANG Na
    Computer Engineering. 2010, 36(11): 123-125. https://doi.org/10.3969/j.issn.1000-3428.2010.11.044
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper introduces the idea of Intelligent Security Defense Software(ISDS), which can make self-decision and reconstruct dynamically to adapt itself to the environment situation. The methods for implementing the sensing and decision-making component in software’s framework are discussed. An environment situation estimation method based on generalized weighted distance is put forward, together with the policy decision-making method. An emulation experiment is made to improve the validity of the policy decision-making method.
  • ZHANG Jian-Zhong, MA Wei-Fang
    Computer Engineering. 2010, 36(11): 126-127,130. https://doi.org/10.3969/j.issn.1000-3428.2010.11.045
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at the problem that current schemes can not protect the benefits of proxy signer and message owner at the same time, this paper presents a blind proxy blind signature scheme on elliptic curve. By using Elliptic Curve Cryptography(ECC) and zero-knowledge proof, it has small amount of computing, high security and high implementation efficiency. Security analysis proves that the scheme satisfies the security properties of blind proxy signature scheme and proxy blind signature scheme, and it has strong enforceability.
  • ZHANG Jian-Zhong, WEI Chun-Yan
    Computer Engineering. 2010, 36(11): 128-130. https://doi.org/10.3969/j.issn.1000-3428.2010.11.046
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In the efficient ID-based certificateless signature scheme, the signer can produce a valid signature without the constraint of public key authentication and the partial private key generated by trusted PKG at the same time. The attacker can forge anyone else’s signature. Aiming at this problem, this paper presents an essential condition for a secure certificateless signature scheme and two corresponding efficient improved signatures are obtained. The improved signature scheme keeps the characters of high efficient and achieves higher safety level.
  • RONG Xiao-Feng, CAO Zi-Jian, ZHOU Li-Hua
    Computer Engineering. 2010, 36(11): 131-133. https://doi.org/10.3969/j.issn.1000-3428.2010.11.047
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at security requirement of key synchronization management between Hardware Security Modules(HSMs) in parallel cryptographic server, this paper constructs a key management security model of cryptographic server cluster system, and proposes four protocols for key synchronization management, including the initial protocol of key cryptographic in cryptographic server cluster, the protocol of cryptographic-key generation and management, the establishment protocol of initial key environment in every cryptographic processor of cluster and the key cryptographic management protocol of new HSM. Security analysis on the protocol is given.
  • QIN Yan-Lin, TUN Xiao-Beng
    Computer Engineering. 2010, 36(11): 134-136,139. https://doi.org/10.3969/j.issn.1000-3428.2010.11.048
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Based on the analysis of proxy multi-signature, multi-proxy signature, multi-proxy multi-signature and blind signature schemes, novel broadcasting and sequential multi-proxy blind multi-signature schemes based on Elliptic Curve Cryptography(ECC) are proposed by combining multi-proxy multi-signature with blind signature. Security of the new schemes is analyzed. Cryptanalysis shows that they both satisfy security requirements of multi-proxy multi-signature scheme and non-trail and blindness for blind signature.
  • FAN Qiang-Na, TAO Lin, TUN Guo-Wei
    Computer Engineering. 2010, 36(11): 137-139. https://doi.org/10.3969/j.issn.1000-3428.2010.11.049
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    When the service user and provider belong to different domains, it needs cross-domain authentication, after successful authentication, it should establish a new session key to secure the subsequent communication. Aiming at this problem, this paper presents an cross-domain authentication and key establishment protocol. Mutual authentication is achieved with the help of the register servers, and new session key is established using the signcryption. Classic SVO logic proves that this protocol can ensure the fairness and tacitness for key, and it can prevent all kinds of safety attack.
  • HU Yu-Beng, ZHANG Jun
    Computer Engineering. 2010, 36(11): 140-142,145. https://doi.org/10.3969/j.issn.1000-3428.2010.11.050
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    This paper presents a novel semi-fragile watermark algorithm for image authentication and recovery. Watermark generation and watermark embedding are disposed in original image, and it needs no information about the original image or watermark when image is authenticating, so it increases the security and confidentiality of watermark. Experimental results show that the algorithm can distinguish intentional content tamper and incidental image processing well, and recover the content modified if image is tampered.

  • WANG Quan-Min, SHU Er-Fu, ZHOU Qing, LIU Yu-Meng
    Computer Engineering. 2010, 36(11): 143-145. https://doi.org/10.3969/j.issn.1000-3428.2010.11.051
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Procedure through system service hooking can change data flow and control flow, and the input and output of system service can be filtered. System service hook in malware is a severe threaten to computer system security. Aiming at this problem, this paper amends system service dispatch routine by memory patch, changes control process of system service invocation, avoids System Service Dispatch Table(SSDT) hook, and uses detection and restoration scheme to resist inline hook of system service function. Design of hookWare procedure validates the effectiveness of two kinds of hook countermeasure scheme.
  • TANG Zhong-Kuan, YAN Xin-Chun, MENG Chun-Yu
    Computer Engineering. 2010, 36(11): 146-147. https://doi.org/10.3969/j.issn.1000-3428.2010.11.052
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In order to solve the security problem that the E-cash users get from bank have no blindness in the new E-cash system based on partial blind signature, this paper brings forward a new E-cash payment model which combines zero-knowledge identity proof based on improved ELGamal signature and partial blind signature. It can track user with the help of the third trusted party to avoid using E-cash illegally. Security analysis indicate that the model has strong security and practicability.
  • HUANG Guang-Qiu, LI Yan
    Computer Engineering. 2010, 36(11): 148-151. https://doi.org/10.3969/j.issn.1000-3428.2010.11.053
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Because vulnerabilities exist in the components of the network nodes during attacking, this paper proposes Network Component Vulnerability Take-Grant(NCVTG) model to describe the network attack on the network components level. The model adds the precise description for the privilege, connection relation and attributes among the network components, and adds the vulnerabilities rewriting rules. A graph privilege transitive closure generation algorithm whose time complexity is polynomial time for NCVTG model is proposed. The algorithm can make dynamic security analysis when the network is changing, and give all attack paths in present vulnerability states. Experimental results prove that the model can make a comprehensive analysis on network security and predict all possible attacks.
  • SHU Hui-Fang, DIAO Hai-Xin, WANG Zhi-Cang, YI Wei
    Computer Engineering. 2010, 36(11): 152-153. https://doi.org/10.3969/j.issn.1000-3428.2010.11.054
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Elliptic Curve Cryptography(ECC) is based on the hardness of elliptic curve discrete logarithm problem, and it has higher security and shorter operands than other cryptographs. Aiming at these advantages, this paper designs a self-certified blind signcryption scheme based ECC. Legal user blinds the signed message, and it is difficult for illegal user to analyze the plaintext without blind factor. This scheme can prevent the illegal user from repudiation, forging and juggling the message, and it satisfies correctness, blindness, enforceability and intractability for blind signcryption.
  • LE De-An, CHANG Jin-Xi, LIU Xiang-Na, GUO Dong-Hui
    Computer Engineering. 2010, 36(11): 154-155,158. https://doi.org/10.3969/j.issn.1000-3428.2010.11.055
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Fast MD5 collision algorithm falls to be used in real application of cracking MD5 password because it does not support reverse cracking. According to the issue, by analyzing the principle of MD5 password parallel cracking algorithm based on Graphic Processing Unit(GPU), this paper proposes a fast MD5 decryption algorithm based on GPU, and implements a fast MD5 password cracking system. Test result proves that the algorithm can accelerate the cracking of MD5 password.
  • JIANG Li, TUN Zhen-Jiang, WANG Hai-Yan, CHONG Hui-Fang
    Computer Engineering. 2010, 36(11): 156-158. https://doi.org/10.3969/j.issn.1000-3428.2010.11.056
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at the limitation of single-domain authentication provided by Direct Anonymous Attestation(DAA), a dynamic trust-based cross-domain authentication mechanism of DAA is proposed, which quantizes trust relation to trust value between 0 and 1, realizes cross-domain authentication by comparing trust value with expectation value. Experimental result proves the mechanism can effectively diminish the workload of Trusted Platform Module(TPM) and reduce the time expense on DAA authentication, and the variety of trust value is given.
  • LIN Xiu-Li, JIANG Chao
    Computer Engineering. 2010, 36(11): 159-160,163. https://doi.org/10.3969/j.issn.1000-3428.2010.11.057
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Sybil attack is a harmful threat which is difficult to be detected in Wireless Sensor Network(WSN), aiming at this problem, this paper presents Sybil attack detection scheme based on a hierarchical grid. According to the versatility of Sybil node identity, it uses hierarchical grid technology preliminary determine physical location of Sybil attack, uses key technology between grid nodes confirm Sybil node. Simulation results show that detection performance is high, memory utilization is low, and network extensible is strong of this scheme, it is fit for multi-hop transport in WSN.
  • FANG Wang-Cheng, ZHANG Chao, CHEN Kang
    Computer Engineering. 2010, 36(11): 161-163. https://doi.org/10.3969/j.issn.1000-3428.2010.11.058
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at the problems of large memory and communication cost, low security in typical key pre-distribution protocol, this paper presents a key pre-distribution scheme for Wireless Sensor Network(WSN) based on Hash function. It improves key security by advantage of one-way Hash function, and establishes key method by once broadcasting process to reduce the communication cost. Simulation results show that this scheme can reduce memory cost and decrease the communication cost from O(2N) to O(N), and improve resilience of node capture.
  • FU Jian-Jing
    Computer Engineering. 2010, 36(11): 164-166,169. https://doi.org/10.3969/j.issn.1000-3428.2010.11.059
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Code decompilation and ereverse engineering is a serious threat to software security, so software protection becomes one important problem. The code obfuscation techniques can increase the complexity of the program, reduce the readability of the program, and effectively prevent automatical reverse engineering and decompilation. Based on the grammar characteristic difference of Java Compiler(JAVAC) and Java Virtual Machine(JVM), the confusing technology of modification of identifier and interruption assigning are presented. Security and performance analysing show the solution is feasible and efficient.
  • CENG An-Piao, FAN Hui-Lian
    Computer Engineering. 2010, 36(11): 167-169. https://doi.org/10.3969/j.issn.1000-3428.2010.11.060
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In order to improve the search efficiency of focused crawler, based on Niche Genetic Algorithm(NGA), this paper proposes a global optimization of search strategy which combines the advantages of content evaluation and link structure. URL search direction is guided by improving the genetic operators and NGA. Compared with other algorithms, experimental results indicate that this strategy has higher precision and recall in searching the topic pages.
  • DAI Chao-Fan, FENG Yang-He
    Computer Engineering. 2010, 36(11): 170-172. https://doi.org/10.3969/j.issn.1000-3428.2010.11.061
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    It is necessary for the intelligent Decision Support System(DSS) to automatic select models, but there is less the available strategy. The knowledge-based automatic model selection strategy is proposed in this paper. The model is represented by knowledge frame and the reasoning trees are established according with the fact base and knowledge base, and then the model selection scheme is provided by integrating the experience and expert knowledge. Experimental result shows that the strategy has high hit rate.
  • YANG Hai-Bei, WANG Zong-Min, ZHANG Chao
    Computer Engineering. 2010, 36(11): 173-175. https://doi.org/10.3969/j.issn.1000-3428.2010.11.062
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    To improve the precision of remote sensing image classification, this paper proposes hybrid multi-classifier combination method. Taking the characteristic of abstract level and measurement level into consideration, the optimal sub-classifier, bagging algorithm and the most large confidence algorithm are combined. This method used in diffierent image classification shows a better enhancement, and results indicate that the hybrid multi-classifier combination algorithm is an effective algorithm for medium-high precision remote sensing image classification.
  • HU Xiao, SHU Wang-Xin, TU Qun, TAO Jing
    Computer Engineering. 2010, 36(11): 176-177,182. https://doi.org/10.3969/j.issn.1000-3428.2010.11.063
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    To avoid the problems which result from twice projects of Two-Dimensional Linear Discriminant Analysis((2D)2LDA), this paper proposes a novel method named complex integration of row and column features based on Two-Dimensional Linear Discriminant Analysis (CI(2D)2LDA). A complex feature matrix is integrated from both row feature matrix and column feature matrix, which are calculated by CI(2D)2LDA. According to their discriminative abilities, a feature vector is extracted from the complex feature matrix. The method’s performance is tested with AT&T and AR face databases. Results show the method is effective and achieves higher recognition rate.
  • LV Xiao-Lian, LV Xiao-Rong, LEI Bing-Fu
    Computer Engineering. 2010, 36(11): 178-179,182. https://doi.org/10.3969/j.issn.1000-3428.2010.11.064
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In order to make tomatoes harvesting robot identify the picking tomatoes accurately, a recognition method of picking tomatoes is put forward. Through statistical analysis to color indicators of the target and background in different color space in field tomatoes images, color indicators of picking object is determined. On different segmentation algorithms comparison, identification model is the establishment for improving Ostu segmentation based on color information. Experimental results show that ripe tomatoes’ success recognition rate is above 98%, and green ripe tomatoes success recognition rate is above 90%.
  • YUAN Bao-Feng, TUN Le-Hua, CENG Wei
    Computer Engineering. 2010, 36(11): 180-182. https://doi.org/10.3969/j.issn.1000-3428.2010.11.065
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In this paper, a Gaussians Mixtures Model(GMM) object detection method combining fractal dimension is put forward aiming at effects caused by changes of natural background. Differential Box Counting(DBC) is used to get the image fractal dimension. A fractal dimension threshold is set to eliminate the natural background. The GMM method is utilized to detect the object. Experimental results show that the performance of the proposed method is better than that of traditional methods.
  • SHU Jing-Liang, WANG Mo-Liang, GE Jing
    Computer Engineering. 2010, 36(11): 183-184,187. https://doi.org/10.3969/j.issn.1000-3428.2010.11.066
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    This paper researches a hybrid Particle Swarm Optimization(PSO) algorithm for solving travel salesman problem. In order to improve the capability of local searching, some local searching algorithms such as inversion and swapping are added. It takes advantage of strong global searching capability of Genetic Algorithm(GA) to further optimize the results got from PSO algorithm, which can further improve the performance of the hybrid algorithm. Besides, it adds an optimization to eliminate cross path of global optimum solution. Simulation result shows this hybrid algorithm can converge to a satisfactory result within a few generations for middle and small scale travel salesman problem.

  • LIU Feng-Wei, WANG Hui-Yuan, JIAO Wei, TUN Xiao-Juan
    Computer Engineering. 2010, 36(11): 185-187. https://doi.org/10.3969/j.issn.1000-3428.2010.11.067
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at the problems caused by the camera shake in video target tracking, this paper proposes a new Markov Chain Monte Carlo (MCMC) particle filtering algorithm based on a twice-observation model. The first observation is to modify the motion model through optical flow calculation between two consecutive frames in the video to approach the true motion equation of the target, while the second observation is MCMC particle filtering procedure. This twice-observation model makes full use of the optical flow information to perform motion compensation. Time variant motion model can increase the efficiency of MCMC algorithm, reduce the number of ineffective particles, and enable it to converge to the real value faster. Experiment shows that combining motion compensation and MCMC particle filtering can handle camera motion problems effectively.
  • ZHOU Fang
    Computer Engineering. 2010, 36(11): 188-189,194. https://doi.org/10.3969/j.issn.1000-3428.2010.11.068
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In a deregulated electricity market, electricity price is one of the main concerns for both suppliers and consumers. However, uncertain factors on electricity prices make it difficult to forecast them. This paper proposes a time series forecasting model which integrates K-Nearest Neighbor(KNN) and Artificial Neural Network(ANN) algorithms. The KNN algorithm is used to search similar time subseries (neighbors) in historical data and the ANN algorithm is used to search the optimal weights on these neighbors. The model is tested with the electricity price in New York electricity market. Compared with traditional ARIMA and Naive I model, the model can get more accurate forecasting results with smaller volatility.
  • CHEN Yong, XIAO Gang, CHEN Jiu-Jun, GAO Fei, JIN Zhang-Zan
    Computer Engineering. 2010, 36(11): 190-191,194. https://doi.org/10.3969/j.issn.1000-3428.2010.11.069
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In order to solve the problem of updating background slowly in the traditional background differencing, this paper proposes a new approach to object detection, which is based on fuzzy inference background segmentation. This method introduces frame difference and combines the IF THEN fuzzy inference rules to update the background rapidly and detect the object accurately. It introduces the anti-noise fuzzy inference, which can suppress the bounce object and improve robustness. This method can efficiently get the clean background and detect the real-time moving object through the experiments on detecting the fishes.
  • XI Jin-Ju, TAN Wen-Hua, BI Xu-Tong, HE Jin-Zhou, LI Chu-Gong
    Computer Engineering. 2010, 36(11): 192-194. https://doi.org/10.3969/j.issn.1000-3428.2010.11.070
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    The expert system of disease diagnosis is subjected to the bad efficiency, the low accuracy and the lack of contrast, by its only one time use of the field knowledge in a reasoning process, which is built on the base of classical model. Making example of goat, this paper designs the architecture of diagnosis system, and introduces the ideology of multi-mode composite reasoning scheme, constructs both Bayesian reasoning supporting learning by self which is based on probability. The method of measuring semantic is based on pattern recognition, and with different theoretical background. Experimental results show that the composite reasoning scheme enables to improve the utilization rate of knowledge, its accuracy of diagnosis reaches 85%, increasing the contrast, and achieves with an accepted macro effect of diagnosis.

  • DONG Hao-Yuan, FANG Xiang-Zhong, TUN Zhi-Kai
    Computer Engineering. 2010, 36(11): 195-197. https://doi.org/10.3969/j.issn.1000-3428.2010.11.071
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The distribution of coefficients of image in the DCT domain can be modeled by a Laplace probability density function with parameter λ. Quantization noise of a compressed image can be estimated from its quantization parameter and λ. This paper proposes a method to estimate the distribution parameter λ and Peak Signal to Noise Ratio(PSNR) according to trained image blocks in spatial domain. As no original image is required, this method is actually no-reference PSNR estimation.
  • LI Xiang, HE Jian-Feng
    Computer Engineering. 2010, 36(11): 198-199,202. https://doi.org/10.3969/j.issn.1000-3428.2010.11.072
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at the status that the compound processing data is insufficient in sample precise detecting, this paper proposes a method of multi-source image fusion analysis for the purpose of increasing the image information. On the basis of analyzing the features of Electron Probe Micro-Analysis(EPMA) images, it gives a method and implemental process of fast EPMA image fusion based on Bandelets transform, and compares and estimates to fusion results. Simulation test results show that the method has definite practical application value.
  • SONG Tu-Qiang, LIU Bo, XIE Jun
    Computer Engineering. 2010, 36(11): 200-202. https://doi.org/10.3969/j.issn.1000-3428.2010.11.073
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Gabor wavelet transform lacks in its ability to classify the medical CT image if it’s rotation invariant image. Aiming at the problem, an approach is presented for rotation invariant medical texture classification based on Gabor wavelet transform. Rotation normalization is achieved by circular shift of the feature elements, so that all images have the same dominant direction. Experimental result shows that Gabor wavelet transform with circular operator of rotation normalization has well precision to classify the medical CT image.
  • BANG Dai-Jiang, DU Feng-Fei, LIN Yao-Quan
    Computer Engineering. 2010, 36(11): 203-205,208. https://doi.org/10.3969/j.issn.1000-3428.2010.11.074
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at the defect that Fuzzy C-Means(FCM) algorithm is sensitive to noise, this paper proposes a FCM image segmentation method based on Total Variation(TV) model by introducing TV function into FCM objective function. The method can adaptively modify penalty factor of image fidelity term according to the texture variation of image. In consideration of the segmentation cost, the noise of image is smoothed within the iteration. Experimental results show that the proposed method can segment the image effectively and solve the confliction between the noise smoothing and the accurate segmentation.
  • GONG Xiao-Lin, MAO Rui-Quan, LIU Kai-Hua
    Computer Engineering. 2010, 36(11): 206-208. https://doi.org/10.3969/j.issn.1000-3428.2010.11.075
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Using intra-scale dependency of wavelet coefficients and generalized Gaussian model, this paper proposes an adaptive neighboring threshold value de-noising method. By calculating the relative coefficients in the different neighborhood, a well neighborhood of relative coefficient is choosen. Through gathering statistics of neighboring size choosen, decomposition level is higher, the probability is biger in a large neighborhood, thus makes for profecting information. Experimental result shows that the method is better than that of fixed neighborhood and improved threshold value, it is a valid de-noising method.
  • CENG Chao-Hui, LIU E-Jun
    Computer Engineering. 2010, 36(11): 209-211. https://doi.org/10.3969/j.issn.1000-3428.2010.11.076
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    On the basis of multi-wavelets parameterization, multi-wavelets with higher regularity are constructed by using total optimal ability of Genetic Algorithm(GA), in which regular exponential function with parameters is used as fitness function. Contrasting with other multi-wavelets of the same supporting length, vanishing moment and multi-filter bank structure, the multi-wavelet is better in regularity. Compressing and de-noising of smooth image and texture image are taked. Experimental results show that the multi-wavelet has better processing ability and performance.
  • DING Chi, HAN Chong-Zhao
    Computer Engineering. 2010, 36(11): 212-214. https://doi.org/10.3969/j.issn.1000-3428.2010.11.077
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The paper proposes an algorithm based on definition and NSCT in multi-focus image fusion. The coefficient of definition area is still adopted as fusion coefficient. In area from definition to blur, regional variance is adopted in low-frequency image, and maximum local energy is adopted in high-frequents subbands. Experimental results show that the proposed method has smallest mean square error compared with gradient pyramid algorithm, wavelet fusion algorithm and Contourlet fusion algorithm.
  • LIU Dun-Feng, HONG Yi, HUANG Guang-Gong
    Computer Engineering. 2010, 36(11): 215-216,220. https://doi.org/10.3969/j.issn.1000-3428.2010.11.078
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Based on the features of JTAG debug system architecture, this paper proposes a hierarchy design method in which the emulator is classified into protocol and physical layer. In protocol layer, the emulator translates a debug operation into a set of hardware micro-operations. In physical layer, the emulator codes the data of micro-operations or decodes the signals received from target chip based on the JTAG specification. By this method, the different designer can focus on the characteristic of proper layer so that a few of different designers can cooperate on the emulator designing efficiently.
  • HONG Fang, AN Gong, XU Guang, HU Mu, TAO Beng
    Computer Engineering. 2010, 36(11): 217-220. https://doi.org/10.3969/j.issn.1000-3428.2010.11.079
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at the consideration of improving the utilizing efficiency of off-chip bandwidth and resolving “Memory Wall” problem, this paper designs a Data-Parallel Memory System(DPMS) for the tiled stream processor in current project. This memory system can reduce the time costs of off-chip memory access and meet the needs of off-chip bandwidth. Results of software simulation and emulation verification indicate that for different workloads, the design can fully capture the row-locality and bank-parallelism of memory access, by optimizing the configuration parameters and further boost the utilizing efficiency of DRAM bandwidth.
  • FENG Sheng, FENG Jian-Xiang, XU Jian-Wen
    Computer Engineering. 2010, 36(11): 221-222,225. https://doi.org/10.3969/j.issn.1000-3428.2010.11.080
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The design process and key technologies of an automatic calling system based on signaling gateway are presented, including the hardware architecture, software systems, device control, call scheduling management and high-volume database access. Compared with the existed telephone call systems, it has such features as large capacity, high efficiency, low cost and easy maintenance. Application of the system in meteorological disaster early-warning shows this system is stable and reliable. It has a higher application value.
  • WANG Yong-Dong, RENG Meng-Tian, LIU Wen-Jiang, LIU Chao
    Computer Engineering. 2010, 36(11): 223-225. https://doi.org/10.3969/j.issn.1000-3428.2010.11.081
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    A H.264/AVC Baseline Profile decoder is presented. The decoder is based on a hybrid pipeline architecture. In addition, several optimizations such as increased parallelism and optimized memory structure are adopted to improve overall system performance. Simulation results show that the decoder requires only 1.5 MHz for QCIF 30 fps real time decoding. The proposed decoder is designed for low-power applications such as mobile multimedia devices and cell phone.
  • DIAO Chun-Yu, HAO Jian-Beng, LI Xing-Xin, TIAN Cheng-Long
    Computer Engineering. 2010, 36(11): 226-228. https://doi.org/10.3969/j.issn.1000-3428.2010.11.082
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In accordance with the characteristic that electronic equipment is hard to realize the maintenance training, a design scheme of fault diagnosis training based on virtual prototyping is presented. A virtual prototyping model facing training is proposed. The methods of three-dimensional geometry modeling are introduced, as well as planar graph modeling and information modeling of virtual prototyping. The basic thinking and training flow of fault diagnosis training are given, and the two different kinds of training modes are used to make the training have pertinence much more, which achieves the purpose of enhancing the performance capability of maintenance man.
  • LIANG Shuang, TAO Ti-Fan-
    Computer Engineering. 2010, 36(11): 229-231,237. https://doi.org/10.3969/j.issn.1000-3428.2010.11.083
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    With the coexistence of continuous and discrete characteristics in manufacturing system, a method of real-time simulation and control of manufacturing system is proposed. The mechanism of time advance is designed for the hybrid nature of the system. Discrete event system model is built in Arena simulation environment, and hardware-in-the-loop simulation of specific continuous event is realized on Labview platform. Interface is designed to achieve connectivity for the continuous and discrete systems. Simulation results in a real manufacturing system show hardware-in-the-loop simulation can better reflect the characteristics of the manufacturing system, and provide a promising way for simulation of hybrid manufacturing systems.
  • WANG Zhuang, CHEN Li-Beng, LIU Yong-Sheng
    Computer Engineering. 2010, 36(11): 232-234,237. https://doi.org/10.3969/j.issn.1000-3428.2010.11.084
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    To solve the problems in agricultural machinery working field, such as information lag, lack of effective means of scheduling agricultural machinery, and low efficiency, an agricultural machinery monitoring and scheduling system integrated with Geographic Information System(GIS), General Packet Radio Service(GPRS) and Global Positioning System(GPS) technologies is presented. To realize data collection immediately and real-time monitoring and scheduling agricultural machinery remotely, GPRS data transmission technology and MapObjects are adopted in the system. To overcome traditional pathfinding algorithm’s shortcomings in real-time computation, A-Star algorithm is applied to plan the route of agricultural machinery. Application results show this system can schedule agricultural machinery effectively and improve the efficiency.
  • ZHENG Jian-Hua, SHU Rong, LI Di, SHU Zhao-Gang
    Computer Engineering. 2010, 36(11): 235-237. https://doi.org/10.3969/j.issn.1000-3428.2010.11.085
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    To overcome the shortcomings of traditional development method of Computer Numeric Control(CNC), a CNC development method based on domain modeling is proposed. Domain meta model design, model transformation, and code automatic generation are the key research content. The construction of CNC meta-model based on multi-view methodology is introduced and the procedure and theory of CNC system code automatic generation is analyzed. The model mapping procedure based on mapping rules library and code template library is detailed. An example of three axes CNC lathe is designed to demonstrate the feasibility and efficiency of the framework.
  • LEI De-Jian
    Computer Engineering. 2010, 36(11): 238-240. https://doi.org/10.3969/j.issn.1000-3428.2010.11.086
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In the situation of future multi-constellation dual frequency, the integrity of services provided by Global Navigation Satellite System(GNSS) is analyzed. Simulation environment is designed for multi-constellation. The odd and even vector method is used to compute the integrity, which achieves distribution of global VPL. Simulation results show that, compared with present standard positioning service provided by Global Positioning System(GPS), the integrity of this system is better. It can meet the requirements of LPV-200 level service for civil aviation.
  • PENG Li, ZHOU Xue-Zhong, GU Cai-Yan, XU Jian, ZHANG Run-Shun, WANG Yang-Hui
    Computer Engineering. 2010, 36(11): 241-243. https://doi.org/10.3969/j.issn.1000-3428.2010.11.087
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    To solve the issue of knowledge discovery on Traditional Chinese Medicine(TCM) herb-symptom relationship, this paper uses Biclustering method to gain the important medicine combination information in TCM clinical diagnosis by computing the herb-symptom similarity. Study results show that Biclustering is an efficient analysis method of TCM medicine combination and herb-symptom relationship.
  • CENG Xian-Lan, MA Cha-Zhong, LIN Xiang-Long, HE Shi-Jiang
    Computer Engineering. 2010, 36(11): 244-246,249. https://doi.org/10.3969/j.issn.1000-3428.2010.11.088
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper studies a fault injection technology based on VHDL. It expounds the theories of simulation commands, saboteurs and mutants and implements them with the injection object, 8051 processor. It compares and analyzes the characters of them. For simulation commands, it studies the signal operation and variable operation styles. Aiming at the variable operation styles, it presents the feasible method. For saboteurs, it analyzes the serial saboteurs and collateral saboteurs, and proves the practical value of the serial saboteurs. For mutants, it introduces the different realizations, and presents the optimization design method.
  • WANG Fu, NI Ke-She, GUO Zhi-Rong
    Computer Engineering. 2010, 36(11): 247-247-249. https://doi.org/10.3969/j.issn.1000-3428.2010.11.089
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper proposes a method to construct Quasi-Cyclic Low-Density Parity-Check(QC-LDPC) codes based on Cyclic Difference Sets(CDS) of combinatory. The constructed regular QC-LDPC codes are free of 4-cycles and with low complexity shift register encoding. Simulations results show that the constructed LDPC codes perform well under sum-product decoding algorithm.
  • HU Ji-Beng, LI Hua-Lai, LIU Zai-Wen, WANG Xiao-Yi
    Computer Engineering. 2010, 36(11): 250-252. https://doi.org/10.3969/j.issn.1000-3428.2010.11.090
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper studies the intelligent mechanical ventilation bed system and the intelligent control algorithm synchronized with breath. Aiming at the shortcomings of signal processing de-nosing method, it introduces the judicature processing process into the de-noising disposal of time series. It proposes a judicature de-nosing algorithm composed of four parts: new data original judgment, doubtful noise checkup, noise confirmation and rules modification. The optimal selected method of the important parameter λ is described. The simulation is implemented by comparing with Fourier transform de-noising, and the results indicate that this algorithm can deal with the time series noise and new steady state, and keeps the original useful information.
  • MAO Guo-Yong, ZHANG Xiao-Bin, XIE Jiang
    Computer Engineering. 2010, 36(11): 253-255. https://doi.org/10.3969/j.issn.1000-3428.2010.11.091
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    To effectively integrate various distributed and heterogeneous bioinformatics resources in the Web, the bioinformatics Problem Solving Environment(PSE)——PSE-Bio based on Web Service uses the uniform client generator to add bioinformatics services provided in Web Services Description Language(WSDL) format. A PSE-Agent is used for resource management and task scheduling; Java Native Interface(JNI) technology is used to encapsulate self-developed and opensource biologic network comparison algorithm existing in the network, and issues them as Web Services. SVG and AJAX are used to implement interactive visualization. Functions of PSE-Bio such as task submission, task backing and result visualization can be implemented only with the browser. PSE-Bio is easy to use and extend.
  • CHA Na-Ri-Su, HE Li-Jiang, WEI Feng-Qi
    Computer Engineering. 2010, 36(11): 256-258,261. https://doi.org/10.3969/j.issn.1000-3428.2010.11.092
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper proposes the classification method for test program based on heat spreading model and classifies the test program in SPEC CPU2000 suite according to peak temperature. It discusses relationship between the heat characteristics of test program and the program behavior. Experimental result shows that heat spreading model based classification is an effective scheme to classify different types of programs. The classification results offer a good reference for the combination of multithread workload.
  • LIU Dao, JIAN Zhi-Hong, LIN Wei-Zhong, XIAO Xuan
    Computer Engineering. 2010, 36(11): 259-261. https://doi.org/10.3969/j.issn.1000-3428.2010.11.093
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The period of ancient ceramic can be determined by patter recognition. This paper uses the vector composed of chemical elements of an ancient ceramic sample and a new vector consists of the vector and its grey model GM(1,1) parameters to express the ceramics sample. The period of the sample is determined by near neighbor algorithm adopting grey incidence degree as distance. The Jack knife test accuracy achieves 79.55%. Experimental results verify the effectiveness of grey system theory in the study of ancient ceramic.
  • HONG Yi, CAO Hui, LI Xiang-Meng
    Computer Engineering. 2010, 36(11): 262-264. https://doi.org/10.3969/j.issn.1000-3428.2010.11.094
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The bid type of traditional Contract Net Protocol(CNP) is too simplex to express the intention of Agent participating in task allocation precisely. Considering the requirements of task preemption mechanism in the target environment, extension to CNP is made, and the distributed multi-Agent coordination system is designed based on the extended CNP. The methods of Agent realization, design of multi-Agent communication mechanism and application of coordination mechanism are given. The system has good extension capability for Agents with different function to be imported dynamically and easily. It provides a foundation platform for the research activities on coordination mechanism.
  • LI Jian-Xin, LIANG Hua-Guo, DAO Jue-Hui
    Computer Engineering. 2010, 36(11): 265-267. https://doi.org/10.3969/j.issn.1000-3428.2010.11.095
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In order to reduce the volume of IC test data, an index coding compression scheme based on test data partition merging is proposed. According to the scheme, the original test set is divided into blocks with fixed width, each block is divided into several groups according to relevance among test fields, several larger groups are picked out and merged into standard fields respectively, the standard fields are stored in the ROM of decompression structure for indexing, the test fields are encoded according to index. It describes the decompression process and provides experimental results. Compared with other scheme, it shows that the scheme is more feasible and effective, and the hardware cost is smaller.
  • LIU Yong-Jun
    Computer Engineering. 2010, 36(11): 268-270,276. https://doi.org/10.3969/j.issn.1000-3428.2010.11.096
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at the development and application requirements of one bank Human Resource(HR) system, this paper brings up AOM & Spring & Hibernate(AomSH) technical architecture, which follows Java EE standard, supports for distributed, cross-platform and multi-database applications, and programmers can apply AomSH to develop B/S application with C/S development model. Rapid design and development of the Web information system are realized based on AomSH. Application result proves that AomSH can improve efficiency of system development and maintainability and strengthen its extensibility.
  • ZHANG Ji, GAO Hong-Feng, SHI Chun-Ling
    Computer Engineering. 2010, 36(11): 271-273,276. https://doi.org/10.3969/j.issn.1000-3428.2010.11.097
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    LT codes can effectively transfer information over erasure channel with unknown erasure rates due to their rateless properties. The cost of LT codes decoding is increasing with the probability of R-set with empty. This paper introduces an improved method of LT codes encoding and decoding which changes the degrees of input symbols, while the degrees of input symbols are according to uniform distribution and 4-cycle is eliminated. The algorithm can decrease the probability of R-set with empty. Simulation results show that the method can reduce the cost of LT codes decoding.
  • LI Bing-Zhang, ZHANG Tian-Beng, JING Zheng-Jun, TUN Fang-Sheng, LUO Ye
    Computer Engineering. 2010, 36(11): 274-276. https://doi.org/10.3969/j.issn.1000-3428.2010.11.098
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at the problems of Non-motor vehicle management in urban and rural areas, this paper develops a new type of intelligent non-motor vehicle registration plate system. On the basis of the working mode of the intelligent non-motor vehicle registration plate system, it gives the design thinking of base-sub pull out-plug in style of registration plate based on RFID technology. It expounds the design and implementation technology of inquiry terminal software/hardware based on embedded technology. The practice performance of inquiry terminal during one time of data acquisition and verification process is analyzed.
  • HUANG De-Jun, WANG Ru-Long, ZHANG Jin, LU Jian-Xiang
    Computer Engineering. 2010, 36(11): 277-279. https://doi.org/10.3969/j.issn.1000-3428.2010.11.099
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In order to tackle with the problems coming up with the structural adjustment of industry chain, this paper proposes a concept of industry chain nodes and describes the enterprise process. Combining with Service-Oriented Architecture(SOA), Service Interface Generation(SIG) algorithm is proposed based on industry chain nodes. Compared with the traditional SOA methods, the proposed algorithm can depict new services more accurately. A typical modern producer service enterprise is used to analyze the performance of the algorithm and the effectiveness of algorithm is verified.
  • MENG Xian-Meng, KONG Feng, CHEN Xu-Gan
    Computer Engineering. 2010, 36(11): 280-282. https://doi.org/10.3969/j.issn.1000-3428.2010.11.100
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Based on the analysis of P2P mode and Digital Rights Management(DRM) technology, aiming at the problem of inefficiency in traditional DRM system, this paper proposes a DRM system based on P2P. Dynamic k-times anonymous authentication technologies are adopted. It makes the digital production transmitted quicker, and the digital right of the production can be saved in security. Analysis results prove that the system is correct and secure, it achieves an effective integration of P2P mode and the DRM technologies.
  • WANG Chun-Wu, LIU Chun-Ling, JIANG Wen-Long
    Computer Engineering. 2010, 36(11): 283-284. https://doi.org/10.3969/j.issn.1000-3428.2010.11.101
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper proposes an extraction method of Chinese characters dot matrix font information based on pixels color, provides control setting method and implementation method of the system with VB6.0. Compared with conventional methods of extracting Chinese characters internal codes, the method can easily modify the display content, font and font size, effectively enrich the font display of LED or LCD display control system, and improve their efficiency.
  • TANG Zuo-Ji, CAO Zhen-Hua, CHEN Dun-Chao, CHEN Jing
    Computer Engineering. 2010, 36(11): 285-287. https://doi.org/10.3969/j.issn.1000-3428.2010.11.102
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In order to meet the development demand of Urban Emergency Response System(UERS) in China, this paper designs a UERS model based on Unified Model Language(UML), which follows the mature modeling language standard of software engineering. The UERS model includes a decision-making of emergency command center, an emergency responding coordination center, dispatching centers of all cooperative units, the sub-branches of the cooperative units, execution divisions and sub-divisions. It can assist the system developers to regulate the development and software reusability of the system, optimize the system architecture, and accelerate the development of UERS.
  • TUN Yang-Bei, GU Quan, SHU Yi-Fan
    Computer Engineering. 2010, 36(11): 288-290. https://doi.org/10.3969/j.issn.1000-3428.2010.11.103
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper combines navy simulation warfare entity decision-making model based on Recognition-Primed Decision-making(RPD), references composite Agent idea. It takes different function module of RPD model into simple sub-Agent, constructs RPD decision-making model based on composite Agent. It gives clearly explanation to the functions of sub-Agent and expressions of empirical knowledge, and clarifies the structures of sub-Agent. Application results show that this model can well simulate decision-making behavior of warfare entity, it has definite flexibility and variability.
  • ZHANG Mei-Yang, JI Zhong-Mei, WANG Jian-Hui
    Computer Engineering. 2010, 36(11): 291-封三. https://doi.org/10.3969/j.issn.1000-3428.2010.11.104
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The Non-Line-Of-Sight(NLOS) error is the main difficulty for mobile user location in cellular wireless communication system. A new NLOS error mitigation algorithm based on the Kalman filter is presented. Both the true value of Time Of Arrival(TOA) and the NLOS error are serves as the state variances of Kalman filter. According to the construction features of the former and the statistic characteristics of the latter, the state transition matrix of Kalman filter is got. The situation when NLOS is exponential is taken as the example, and the results indicate the algorithm can work faster with better estimation accuracy.